This Just In: Hot Topics Affecting Compliance Professionals

Sep 28, 2015 2:00pm ‐ Sep 28, 2015 3:15pm

Identification: CS2

Join us for a rigorous exploration of breaking news and trending topics in the world of AML compliance and financial crime. Our expert panelists will tell you what’s happening, why it matters and where things may be headed from here. It’s a can’t-miss briefing on subjects you need to know about, with tips to help your organization respond.

Operation Fashion Police and the Persistent Threat of Trade-Based Money Laundering

Sep 28, 2015 2:00pm ‐ Sep 28, 2015 3:15pm

Identification: OC2

• Strengthening your CDD practices and geographic risk assessments to unmask potential TBML
• Effectively spotting methods of facilitating black market peso exchanges
• Boosting your monitoring techniques to detect cross-border money movements and third-party payments serving no clear business purpose

Conquering the Complexities of Third-Party Reliance

Sep 28, 2015 2:00pm ‐ Sep 28, 2015 3:15pm

Identification: CT2

• Understanding reliance when it comes to third parties conducting some or all elements of CIP
• Identifying the benefits and risks of third-party AML/KYC contracted reliance and whether it is the best option for your institution
• Developing a robust process for internal AML/KYC reliance between business units and/or corporate functions that meet regulatory expectations   

Incorporating BSA/AML into Your ERM Program (Presented by CSI)

Sep 28, 2015 2:00pm ‐ Sep 28, 2015 3:15pm

Identification: SE3

• Understanding regulators’ growing focus on the need for enterprise risk management (ERM) programs
• Developing strategies for an effective ERM program that encompasses the advanced aspects of BSA/AML compliance

From Risk Assessment to Risk Management: Making Your AML and Sanctions Risk Assessment Matter (Presented by Ernst & Young)

Sep 28, 2015 2:00pm ‐ Sep 28, 2015 3:15pm

Identification: SE4

• Learning the advantages of proactive management of risk
• Applying strategies for leading risk assessment approaches
• Utilizing risk assessments to guide compliance program enhancements
 

Applying Lessons from Recent Gaming Enforcement Actions

Sep 28, 2015 2:00pm ‐ Sep 28, 2015 3:15pm

Identification: MIT3

• Improving AML programs to ensure the proper reporting of suspicious transactions
• Avoiding penalties arising from inadequate systems, weak internal controls and flawed recordkeeping
• Spotting and reporting suspicious actions such as minimal gaming with large transactions

Preparing for Examination Priorities for MSBs in the Coming Year

Sep 28, 2015 2:00pm ‐ Sep 28, 2015 3:15pm

Identification: MIT4

• Clarifying your examiner’s expectations regarding beneficial ownership determination
• Balancing financial inclusion and financing transparency
• Addressing inter-agency examiner differences on risk rating standards by MSBs

Modernizing Money Laundering and Fraud Monitoring for Cryptocurrencies Modules Risks

Sep 28, 2015 3:25pm ‐ Sep 28, 2015 4:40pm

Identification: CS3

• Pinpointing common fraud schemes using cryptocurrencies for money transport
• Developing alert libraries to identify potential abuses linked to mobile payments
• Mining the web and social networks to enhance CDD/EDD on virtual currencies

Russian Risks: Spotting Trade-Based Money Laundering, Corruption and PEP Activity

Sep 28, 2015 3:25pm ‐ Sep 28, 2015 4:40pm

Identification: OC3

• Examining trade-based money laundering in the commodities markets
• Successfully identifying banking relationships linked to Russia’s blacklisted oligarchs
• Enhancing your systems and procedures in accordance with the Foreign Corrupt Practices Act
 

Reviewing and Updating Your Customer On-Boarding Process

Sep 28, 2015 3:25pm ‐ Sep 28, 2015 4:40pm

Identification: CT3

• Assembling an enterprise-wide client onboarding governance team to assure consistent client screening
• Collaborating with IT to verify customer identity or entity ownership, sanctions screening and producing intelligent document management
• Formalizing behavior- and transaction-based ongoing monitoring methods to detect actions requiring reviews or corrective action